The Snort intrusion detection system is a widely used and well-regarded open sourcesystem used for the detection of malicious activity in conventional wired networks. Recently, so...
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
Enterprise Resource Planning (ERP) packages have been widely adopted and it is becoming clear that this is driven by multiple rationales that may be simultaneously at odds and com...
Business visualization is an effective tool for business decision making and problem solving. Despite its obvious benefits, 3D visualization is far less common in practice than it...
The increasing demand for group support in software has drawn more attention to the field of designing Group Support Systems. Notwithstanding all the research in this field the pr...